Showing posts with label computer repair. Show all posts
Showing posts with label computer repair. Show all posts

Wednesday, February 9, 2011

McAfee Warns - "Malware Is on the Move"

Mobile operating systems are the new favorite target of malware, and social engineering remains the favorite old standby for launching attacks. Tried-and-true preventive care works best.
"Never give information via email, smartphone or on the Web, and verify independently before you click on any unknown text or email message, game, application or security update,"
advises UVa security expert Karen McDowell.

Cybercriminals are following innocent consumers away from email Increase sales with VerticalResponse. Free trial. and toward more popular, smartphone-style platforms, McAfee reported Tuesday.
"New mobile malware in 2010 increased by 46 percent compared with 2009," noted McAfee spokesperson Joris Evers.

Among the likeliest targets in 2010, Symbian and Android platforms were splattered by Trojans and bots with names like "SymbOS/Zitmo.A" and "Android/Geinimi."

"Consumers need to realize that mobiles, whether smartphone or tablet, are mini computers," said David Gorodyansky, CEO of AnchorFree. "This means all the vulnerabilities of a computer exist, often with a less-protected OS."

"From a hacker's point of view, the large user base created by wide scale adoption of iOS (iPhone) and Android will increasingly make these platforms a target, and I definitely expect to see some high-profile mobile attacks in the coming year,"
Cenzic CMO Mandeep Khera told TechNewsWorld.

"Smartphone access should be a concern to corporations that don't want employees accessing company secrets via unsecured mobile networks," Khera told TechNewsWorld. "For consumers, as banks and e-commerce sites deploy apps that give customers unprecedented access to their bank accounts, security Enterprise Payment Security 2.0 Whitepaper from CyberSource becomes more important than ever."

Unlike their mobile partners in crime, spam bots -- including Bredolab, Lethic, Xarvester, and parts of the Zeus botnet -- have gone dormant in droves this year,.

"Concurrently, spam accounted for 80 percent of total email traffic in Q4 2010, the lowest point since the first quarter of 2007," McAfee's Evers told TechNewsWorld.

The Bot Pack


Like a flu pandemic, botnet infections were particularly acute in Q4 2010, with Rustock, Cutwail and Bobax leading the bot pack. Social media sites, like mosquitoes, often acted as disease vectors.

"Whether we are using smartphones or computers, social engineering attacks are still the primary attack vector, and a major vector in the spread of botnet infections,"
University of Virginia information security analyst Karen McDowell, PhD, GCIH, told TechNewsWorld.

McAfee advises tablet and smartphone users to watch out for Zeus-Murofet, Conficker, and Koobface botnets specifically, and more generally, phishing URLs from the IRS, gift cards, rewards accounts, and social networking accounts.

Phishing vectors spread bot diseases when users click on phishing emails, answer phishing phone calls, or click on text messages that "appear to come from your carrier," McDowell explained, adding that tried-and-true preventive care works best. "Never give information via email, smartphone or on the Web, and verify independently before you click on any unknown text or email message, game, application or security update."

More preventive options: "Don't log onto unprotected WiFi, and use a VPN to encrypt and secure your browsing, which acts as a secure, encrypted tunnel for your communications," AnchorFree's Gorodyansky told TechNewsWorld.

Malware's Mantra


Twenty million new pieces of malware -- nearly 55,000 new malware threats every day -- plastered the cybersphere in 2010, migrating toward smartphones because "cybercriminals are keeping tabs on what's popular and what will have the biggest impact from the smallest effort," said Vincent Weafer, senior vice president of McAfee Labs.

"Think globally, act locally" might be malware's new mantra, with threats that "now tend to match the types of users, habits and events that are specific to a region," McAfee's Evers added. Global criminal favorites include AutoRun malware such as Generic!atr; banking Trojans and downloaders such as PWS or Generic.dx; and Web-based exploits such as StartPage and Exploit-MS04-028, the McAfee report claims.

To avoid malware, treat search terms and Adobe (Nasdaq: ADBE) products with extra care, McAfee advises. Of the top 100 search results, 51 percent led to malicious sites. And throughout 2010, malware developers exploited weaknesses in Flash and PDF, a trend McAfee sees continuing.

Despite the advice, pests will persist, driven to infect by "a general lack of awareness towards the need for security," Gorodyansky explained.

"This is the same as it was for computers, when most people thought they were completely safe once they installed an antivirus program," he recalled.

"It really doesn't matter what type of device is used -- the steps to secure a Web application haven't changed," Sam Shelby, e-government coordinator for the City of Columbia, Missouri, told TechNewsWorld. "You can never trust input: always authenticate, validate and sanitize input data."

courtsey-technewsworld

Friday, February 4, 2011

Troubleshoot Windows, Tweak Office & Add USB Ports

Here we'll discuss some questions about troubleshooting of Windows programs, making Office 2007 and 2010 look more like earlier versions of the suite, and the proper use of USB hubs.

Use a Spare User Account to Troubleshoot Windows Problems

Recently a couple readers wrote to me with very similar problems. One was having trouble getting Internet Explorer to run; the other, Windows Explorer.

In other words, a couple of Windows' own built-in tools were broken. (Note to Microsoft: That should not happen. Come on!)

Usually, for situations like these, I recommend an end-run around the problem. Internet Explorer won't work? Install Firefox or Chrome and use that instead. Can't load Windows Explorer? Switch to any number of even better Windows Explorer replacements.

Of course, that doesn't really solve the problem. If you're hoping to fix your broken tool, you'll need to do a little troubleshooting. To start, I recommend switching to (or creating) another user account, then seeing if Explorer runs properly. If it does, you've narrowed down the problem significantly (and should consider "moving" to a new user account permanently). If not, well, back to square one.

Either way, it's a simple method of figuring out how deeply rooted into Windows the problem is. And that will help considerably as you Google-search for an actual fix (assuming there is one--sometimes these things can be resolved only by reinstalling Windows).Make the Office 2007/2010 Toolbars More Familiar

Make the Office 2007/2010 Toolbars More Familiar

One of the reader recently found himself face-to-face with Word 2007 for the first time, and quickly declared the "top task bar too complicated for my novice use." He's referring to what Microsoft calls "the Ribbon," and he wants to know if there's a way to simplify it.

No doubt about it, the Ribbon (which appears in most Office 2007 and all Office 2010 programs) can seem daunting to anyone accustomed to earlier versions of Word, Excel, and the like. If that's you, check out UBitMenu. This free plug-in brings pull-down menus back to Office 2007 and 2010, thus easing your transition. Thankfully, it keeps the Ribbon, too, so you can learn the new interface without totally abandoning the old one.

After installing UBitMenu, you'll see a new tab next to Home: the aptly named Menu. Click it and you'll find File, Edit, View, Insert, Format, and all the rest of those long-lost drop-downs. Even better, UBitMenu retains most of Office's newer features, like the more robust Save As submenu. You get the best of both worlds. The program is free for private, personal use. I can't recommend it highly enough.

Add More USB Ports to Your PC

Another reader wants to know how many USB "splitters" he can use with his desktop. The system has four USB ports in the back and two in the front; Jay says he's already using one splitter, but needs two additional USB ports.

Holy mackerel, Jay, how many devices do you have? (I'm a power user myself, and only four of my desktop's six ports are occupied.)

To answer your question, yes, it's safe to add another splitter (which, although an apt description, is traditionally known as a USB hub). In fact, a PC is theoretically capable of accommodating up to 127 USB ports. However, the reality is a bit different.

By "splitting" a USB port, you reduce the power available to the newly added ports. Whether or not that's a problem depends on the kinds of devices you plug in, but I strongly recommend using only powered USB hubs. They cost a little more, and force you to find yet another free AC outlet, but they virtually eliminate the issues that tend to arise with non-powered hubs.

I also recommend plugging each hub directly into one of your PC's built-in USB ports. In other words, don't daisy-chain them. And if you use an external hard drive, plug that into a built-in (i.e. non-hub) port as well. When it comes to your data, it's not wise to risk any kind of power fluctuation.

Thursday, February 3, 2011

Welcome to Tech Help and Support

Hello to All Viewers and Readers,

This is a blog dedicated to the whole tech community.

You can find a lot of technical information here on regular basis.

For complete and comprehensive tech support you can call our  

Toll Free No.-1-866-978-7967

or just login to the site-http://www.brainbytetech.com